From 1e1f0f2364fefb5ac98698f187ea800eec7c85ec Mon Sep 17 00:00:00 2001 From: Ian Dunn Date: Fri, 21 Oct 2022 15:44:08 -0400 Subject: [PATCH] Update CVE-2011-2845.yml Add 20 upvotes and a nickname; the YML file appears to be completed. --- cves/CVE-2011-2845.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/CVE-2011-2845.yml b/cves/CVE-2011-2845.yml index 9aa02f282..794c68e58 100644 --- a/cves/CVE-2011-2845.yml +++ b/cves/CVE-2011-2845.yml @@ -1,5 +1,6 @@ --- CVE: CVE-2011-2845 +nickname: Rerouted Fragments CWE_instructions: | Please go to cwe.mitre.org and find the most specific, appropriate CWE entry that describes your vulnerability. (Tip: this may not be a good one to start @@ -79,7 +80,7 @@ upvotes_instructions: | upvotes to each vulnerability you see. Your peers will tell you how interesting they think this vulnerability is, and you'll add that to the upvotes score on your branch. -upvotes: 5 +upvotes: 25 unit_tested: question: | Were automated unit tests involved in this vulnerability?